33
Roman Schlegel City University of Hong Kong Kehuan Zhang Xiaoyong Zhou Mehool Intwala Apu Kapadia XiaoFeng Wang Indiana University Bloomington NDSS SYMPOSIUM 2011 報報報 報報報 Soundcomber A Stealthy and Context-Aware Sound Trojan for Smartphones

Roman Schlegel City University of Hong Kong Kehuan Zhang Xiaoyong Zhou Mehool Intwala Apu Kapadia XiaoFeng Wang Indiana University Bloomington NDSS SYMPOSIUM

Embed Size (px)

Citation preview

R o m a n S c h l e g e lC i t y U n i v e r s i t y o f H o n g K o n g

K e h u a n Z h a n g

X i a o y o n g Z h o u

M e h o o l I n t w a l a

A p u K a p a d i a

X i a o F e n g Wa n gI n d i a n a U n i v e r s i t y B l o o m i n g t o n

N D S S S Y M P O S I U M   2 0 11報告人:張逸文

Soundcomber :A Stealthy and Context-Aware Sound Trojan for

Smartphones

2

Outline

IntroductionOverviewContext-Aware Information CollectionStealthy Data TransmissionDefense ArchitectureEvaluationDiscussionConclusion

3

Introduction( 1/2)

Full-fledged computing platformsThe plague of data-stealing malware

Sensory malware, ex: video camera, microphoneSecurity protections

Java virtual machines on Android Anti-virus Control installing un-trusted software

Tow new observations Context of phone conversation is predictable and fingerprinted Built-in covert channel

4

Introduction( 2/2)

Main goal: Extract a small amount of high-value private data from phone

conversations and transmit it to a malicious partyMajor contributions:

Targeted, context-aware information discovery from sound recordings

Stealthy data transmission Implementation and evaluation Defensive architecture

5

Outline

IntroductionOverviewContext-Aware Information CollectionStealthy Data TransmissionDefense ArchitectureEvaluationDiscussionConclusion

6

Overview( 1/2)

Assumptions work under limited privileges

Architectural overview

7

Overview( 2/2)

Video Demo.

4392 2588 8888 8888

8

Outline

IntroductionOverviewContext-Aware Information CollectionStealthy Data TransmissionDefense ArchitectureEvaluationDiscussionConclusion

9

Context-Aware Information Collection( 1/7)

monitor the phone state identify, record, analysis, extract

1. Audio recording2. Audio processing3. Targeted data extraction

using profiles

10

Context-Aware Information Collection( 2/7)

1. Audio recording When to record

Whenever the user initiates a phone call Recording in the background Determining the number called

intercept outgoing phone calls / read contact data the first segment compare with keywords in database relevant, non-overlapping keywords minimize necessary permissions

11

Context-Aware Information Collection( 3/7)

2. Audio processing decode file speech/tone recognition speech/tone extraction

12

Context-Aware Information Collection( 4/7)

a) tone recognition DTMF( dual-tone multi-frequency)

signaling channel to inform mobile phone network of the pressed key aural feedback leaks to side-channel Goertzel’s algorithm

13

Context-Aware Information Collection( 5/7)

b. Speech recognition Google service: speech recognition functionality PocketSphinx Segmentation --- contain speech

sound

silence

n

jxn

thrk

thrk

gthr

n

k

kf

g

n

jsk

f

s

Recordin

0

Recordin

2

0

1

1

14

Context-Aware Information Collection( 6/7)

3. Targeted data extraction using profiles focus on IVRs ( Interactive Voice Response system)

Phone menus based on predetermined profiles

15

Context-Aware Information Collection( 7/7)

general profiles Speech signatures Sequence detection Speech characteristics

16

Outline

IntroductionOverviewContext-Aware Information CollectionStealthy Data TransmissionDefense ArchitectureEvaluationDiscussionConclusion

17

Stealthy Data Transmission

Processing centrally isn’t idealNo local processing on 1 minute recording → 94KBCredit card number → 16 bytesLegitimate, existing application with network accessA paired Trojan application with network access and

communication through covert channel

18

Leveraging third-party applications

Permission mechanism only restricts individual application Ex: using browser open URL http : // target ? number=N

drawback: more noticeable due to “foreground” Ads to cover

19

Covert channels with paired Trojans( 1/4)

paired Trojans: Soundminer, DelivererInstallation of paired Trojan applications

Pop-up ad. Packaged app.

Covert channels on the smartphone Vibration settings Volume settings Screen File locks

20

Covert channels with paired Trojans( 2/4)

Vibration settings any application can change the vibration settings communication channel: every time the setting is changed, the system

sends a notification to interested applications saving and restoring original settings at opportune times no permissions needed not leave any traces

21

Covert channels with paired Trojans( 3/4)

Volume settings not automatically broadcasted set and check the volume alternatively 3 bits per iteration Sending at times

Reading at times miss a window

Screen invisible visible channel covert channel: screen settings prevent the screen from actually turning on permission WAKE_LOCK

11000

,......,0,ti

msktkt is

2iis ttkt

22

Covert channels with paired Trojans( 4/4)

File locks exchange information through competing for a file lock signaling files, S1,……,Sm

one data file S1~Sm/2 for Soundminer , Sm/2+1~Sm for Deliverer

23

Outline

IntroductionOverviewContext-Aware Information CollectionStealthy Data TransmissionDefense ArchitectureEvaluationDiscussionConclusion

24

Defense Architecture

add a context-sensitive reference monitor to control the AudioFinger service

block all applications from accessing the audio data when a sensitive call is in progress

Reference Service RIL( radio interface layer) enter/leave a sensitive state

Controller Embedded in the AudioFinger service Exclusive Mode / Non-Exclusive Mode

25

Outline

IntroductionOverviewContext-Aware Information CollectionStealthy Data TransmissionDefense ArchitectureEvaluationDiscussionConclusion

26

Evaluation( 1/2)

Experiment settings Environment Service hotline detection Tone recognition Speech recognition --- getrusage() Profile-based data discovery --- extracted high-value information Cover channel study --- bandwidth in bits per second Reference monitor

27

Evaluation( 2/2)

Experiment results Effectiveness

Service hotline detection Tone/speech recognition Detection by anti-virus applications

Performance

28

Outline

IntroductionOverviewContext-Aware Information CollectionStealthy Data TransmissionDefense ArchitectureEvaluationDiscussionConclusion

29

Discussion

Improvements on attackDefenses

30

Conclusion

Soundminer, innocuous permissionsDefense on sensor data stealingHighlighted the threat of stealthy sensory malware

31

Thanks ~

33

Performance